SYSTEM AND METHOD FOR IDENTIFYING MOBILE COMMUNICATION DEVICES
A method includes detecting, at a device coupled to a network, a communication transmitted over the network. The method includes determining whether the communication is associated with an unauthorized data request, and, in response to determining that the communication is associated with the unauthorized data request, determining an access point associated with a source of the communication. The method further includes transmitting a message to a service provider. The message may request identification of mobile communication devices that are located within a threshold distance of the access point.
Latest AT&T Patents:
- Wireline and/or wireless integrated access networks
- Methods, systems, and devices for configuring a federated blockchain network
- Multifrequency configuration and management for new radio-based smart repeaters
- Apparatuses and methods for identifying suspicious activities in one or more portions of a network or system and techniques for alerting and initiating actions from subscribers and operators
- Contextual avatar presentation based on relationship data
The present disclosure is generally related to identification of mobile communication devices near a location.
BACKGROUNDUsers are increasingly connecting to the internet using public access points. Many public access points do not require a user to provide identifying information, such as a user name or password, when the user connects an electronic device to the access point (e.g., a personal computing device or cell phone having a wireless connection to a wireless access point). When many users simultaneously access a network, such as the internet, from a public access point, it may be difficult to associate network behavior related to transmissions of the access point to any particular user or electronic device.
For example, when an electronic device that is connected to the public access point is used to conduct an unauthorized action, it may be difficult to identify the owner or user of the electronic device. Some public access points temporarily store information, such as a media access control (MAC) address, for each electronic device that connects to the public access point. When an electronic device terminates the connection with the public access point, the information stored at the public access point (e.g., a MAC address of the electronic device) may be subsequently overwritten as connections between the public access point and other electronic devices are established. Additionally, even though it may be possible to locate the public access point and extract the MAC addresses stored thereon, it may be difficult to identify the user that initiated the unauthorized action based on the MAC address.
Systems and methods to identify mobile devices located proximate to an access point are disclosed. The disclosed systems and methods may also enable identification of a subscriber associated with an identified mobile communication device. To illustrate, a user may access a network using an electronic device (e.g., a personal computing device or a mobile communication device) connected to an access point. The user may send an unauthorized data request (e.g., an unauthorized download or webpage access request) to a content provider (e.g., a website) via the network. The unauthorized data request may be detected by a detection server coupled to the network. The detection server may send a request to a mobile communication service provider to identify mobile communication devices located proximate to the access point at or near the time of the unauthorized data request. Numerous mobile communication devices may be identified as proximate to one or more access points in response to numerous requests from the detection server. Each request may correspond to a different unauthorized data request detected by the detection server. Information associated with the identified mobile communication devices may be stored at a correlation server. The information associated with the identified mobile communication devices may include an identifier associated with an unauthorized data request detected at the detection server. The correlation server may generate correlation data that indicates that a particular mobile communication device was identified as being located proximate to one or more access points when multiple unauthorized data requests occurred. The correlation data may indicate that a subscriber associated with the mobile communication device initiated at least some of the multiple unauthorized data requests.
In a particular embodiment, a method of identifying mobile communication devices located near an access point is disclosed. The method includes detecting, at a device coupled to a network, a communication transmitted over the network. The method also includes determining whether the communication is associated with an unauthorized data request. When the communication is associated with the unauthorized data request, the method further includes determining an access point associated with a source of the communication. The method also includes transmitting a message to a service provider. The message may request identification of mobile communication devices that are located near the access point (e.g., within a threshold distance of the access point).
In another embodiment, a method of identifying mobile communication devices located near an access point includes receiving a request to identify mobile communication devices located within a threshold distance of an access point. The request may be received at a server of a mobile communication service provider from a detection server. The method includes identifying one or more mobile communication devices located near the access point (e.g., within the threshold distance of the access point). The method also includes transmitting a message to a correlation server via a network. The message may include information identifying the one or more mobile communication devices.
In yet another embodiment, a computer-readable storage device includes instructions that, when executed by a processor, cause the processor to receive first data identifying mobile communication devices that are located within a threshold distance of a first access point. The first access point may be a source of an unauthorized data request. The computer-readable storage device further includes instructions that, when executed by the processor, cause the processor to receive second data identifying mobile communication devices that are located within the threshold distance of the first access point. The computer-readable storage device further includes instructions that, when executed by the processor, cause the processor to identify at least one mobile communication device identified by the first data and the second data. For example, a particular mobile device may be located near an access point at a first during a first unauthorized data request and at a second time during a second unauthorized data request.
Referring to
In an embodiment, a content provider 114 may be coupled to the network 104 via a wired or wireless connection. Communications directed to the content provider 114 may be transmitted over the network 104 and received by the content provider 114. For example, electronic devices (e.g., the mobile communication devices 128, 130, the personal computing device 134, etc.) may transmit a communication over the network 104 to the content provider 114 via the access point 102. In response to receiving the communication, the content provider 114 may send data over the network 104 to the electronic device via the access point 102.
In an embodiment, a detection server 110 may be coupled to the network 104 via a wired or wireless connection. The detection server 110 may be configured to monitor communications transmitted over the network 104. Databases 112 may be accessible to the detection server 110. As explained in more detail with reference to
As shown in
The service provider 106 may be in communication with a mobile locating system (MLS) 122. The MLS 122 may be configured to provide information that identifies mobile communication devices of subscribers of the service provider that are within a coverage area of a base station.
The service provider 106 may be communicatively coupled to a gateway mobile location center (GLMC) 124. The GLMC 124 may be configured to communicate with the wireless communication devices 128, 132, 144 using wireless connections 138 via the base station 140. In a particular embodiment, the GLMC 124 is configured to send a request to one or more of the communication devices 128, 132, 144. The request may instruct each of the mobile communication devices 128, 132, 144 to provide a global positioning system (GPS) location or coordinates to the GLMC 124. The request may include ephemeris data. In an embodiment, the GLMC 124 may be determine the ephemeris data based on an identified base station (e.g., the base station 140). The ephemeris data may identify GPS satellites accessible to mobile communication devices within a coverage area of the identified base station (e.g., a coverage area of the base station 140).
As shown in
In an embodiment, a correlation server 116 may be connected to the network 104 via a wired or wireless connection. The correlation server 116 may receive one or more lists from one or more service providers (e.g., the service provider 106, the other service providers 108). The one or more lists may be sent to the correlation server 116 from servers of the service provider 106 and the other service providers 108 automatically or in response to a request. In a particular embodiment the request may be sent to the servers of the service provider 106 and the other service providers 108 from the detection server 110 or from another server of the service provider 106 or the other service providers 108.
In an embodiment, the one or more lists received at the correlation server 116 may include information that identifies one or more mobile communication devices (e.g., mobile communication devices 128, 130, 132, 142, 144) that are located proximate to an access point (e.g., the access point 102). A particular mobile communication device (e.g., one of the mobile communication devices 128, 130, 132, 142, 144) may be proximate to the access point 102 when the particular mobile communication device is within a threshold distance 146 of the access point 102. The information may also include data identifying a communication transmitted to the network 104. The communication may have been originated by an electronic device and transmitted to the network 104 via the access point 102. The correlation server 116 may be configured to generate correlation data based on the received one or more lists as will be explained in more detail below.
Referring to
As shown in
The communication 202 may be received at a content provider 114. In response to receiving the communication 202, the content provider 114 may transmit data 204 through the network 104 to the personal computing device 134. In a particular embodiment, the data 204 may include website data (e.g., hyper-text markup language (html) code, images, etc.) associated with a webpage of a website. For example, the website may be a government website, a corporate website, an illegal content distribution website, or a pornography website. In another embodiment, the data 204 may be associated with a file. The file may be downloaded from the content provider 114 by an electronic device (e.g., the personal computing device 134) via the network 104. The file may be one of a confidential document, a corporate document, a government document, a copyrighted document, a music file, a video file, and a picture file.
The communication 202 may be intercepted or otherwise detected by a detection server 110 coupled to the network 104. In an embodiment, the communication 202 may be transmitted over the network 104 as one or more packets in accordance with a network protocol (e.g., an internet protocol). The detection server 110 may intercept one or more of the packets transmitted over the network 104. The detection server 110 may be configured to analyze the communication 202 and/or the one or more intercepted packets. For example, the detection server 110 may perform a deep packet inspection of one or more of the intercepted packets. The detection server 110 may analyze an intercepted packet to identify a network address (e.g., an internet protocol address) of a destination of the data request, a type of the data request (e.g., a request to access a webpage, a request to initiate a data transfer, etc.), and a network address (e.g., an internet protocol address) of a source of the communication 202. The intercepted packet may include a plurality of headers and a data field. A first header of the intercepted packet may include the network address of the source of the communication 202. A second header may include the network address of the destination of the communication 202. The data field may include data that identifies the type of the communication 202.
The data 204 transmitted from the content provider 114 to the electronic device (e.g., the personal computing device 134) may be intercepted or otherwise detected by the detection server 110. In an embodiment, the data 204 may be transmitted over the network 104 as one or more packets in accordance with a network protocol (e.g., an internet protocol). The detection server 110 may intercept one or more of the packets transmitted over the network 104. The detection server 110 may be configured to analyze the data 204 and/or the one or more intercepted data packets. For example, during operation the detection server 110 may intercept data 204. The detection server 110 may analyze the data 204 to identify a network address (e.g., an interne protocol address) of a destination of the data 204 (e.g., the access point 102). The detection server 110 may also analyze the data 204 to identify content of the data 204 (e.g., a digital signature), a network address (e.g., an internet protocol address) of a source (e.g., the content provider 114) of the data 204, or both.
During operation, the detection server 110 may detect the communication 202 transmitted over the network 104. The communication 202 may be associated with a data request. The detection server 110 may determine whether the communication 202 is associated with an unauthorized data request. In a particular embodiment, the detection server 110 may use deep packet inspection to identify a network address of a destination of the communication 202 (e.g., the content provider 114), to identify a network address of a source of the communication 202 (e.g., the access point 102), to identify a type of the communication 202, or any combination thereof. The detection server 110 may determine whether information associated with the communication 202 matches an identifier of an unauthorized data request. In a particular embodiment, the type of the communication 202 may be a request to access a webpage. A data field of the communication 202 may include a uniform resource indicator (URI) associated with the webpage (e.g., a uniform resource locator (URL) of the webpage). The detection server 110 may access one or more databases 112 to determine whether the URI (e.g., the URL of the webpage) included in the data field of the data request matches an identifier stored at one of the one or more databases 112. As explained above, and in more detail with reference to
In another particular embodiment, the type of the communication 202 may be a request to initiate a data transfer. The data transfer may be associated with a particular file. A data field of the communication 202 may include a file identifier (e.g., a filename). The detection server 110 may access one or more databases 112 to determine whether the file identifier included in the data field of the communication 202 matches an identifier stored at one of the one or more databases 112. In a particular embodiment, the detection server 110 may extract the file identifier from a single packet. In another embodiment, the detection server 110 may extract the file identifier from more than one packet. In yet another embodiment, the detection server 110 may determine whether information in the data field matches a portion of the identifier stored at the one or more databases 112.
In response to determining that the communication 202 is associated with an unauthorized data request, the detection server 110 may determine an access point (e.g., the access point 102) where the unauthorized data request originated. The detection server 110 may determine the access point (e.g., the access point 102) based on a network address (e.g., an internet protocol address) of the access point. The detection server 110 may estimate a physical location of the access point based on the network address. Estimating the physical address may include performing a physical address lookup based on the network address. In an embodiment, one of the databases 112 may include data that provides a mapping of network addresses to physical addresses. The detection server 110 may access the data to estimate the physical address of the access point based on the network address. In another embodiment, a lookup server (not shown) may be used to perform the physical address lookup. The lookup server may receive a request from the detection server 110 requesting the physical address of the access point. The request may include the network address of the access point. The lookup server may perform the physical address lookup based on the network address and transmit a response to the detection server 110. The response may include the physical address of the access point. The lookup server may be accessible to the detection server 110 via the network 104. In an embodiment, the lookup server may be associated with a service provider. In an embodiment, the service provider is an internet service provider that provides the access point. In another embodiment, the service provider is a mobile communications service provider that provides the access point. It should be understood that more than one lookup server may be used. For example, a first lookup server may be associated with a first service provider (e.g., service provider 106) and other lookup servers may be associated with other service providers (e.g., other service providers 108). The detection server 110 may send multiple requests to each lookup server to estimate the physical address of the access point.
The detection server 110 may transmit a message to a service provider (e.g., service provider 106). The message may request identification of mobile communication devices that are located within a threshold distance (e.g., threshold distance 146 of
Referring to
In
As explained with reference to
In response to determining that the communication/data 302 is associated with an unauthorized data request, the detection server 110 may determine an access point where the unauthorized data request originated. The detection server 110 may determine the access point based on a network address of the access point as explained with reference to
During operation, the detection server 110 may intercept or otherwise detect the communication/data 302 transmitted over a network 104. The detection server 110 may determine an access point (e.g., the access point 102) where the unauthorized data request originated. The detection server 110 may determine the access point based on a network address of the access point as explained with reference to
The request 304 may be transmitted from the detection server 110 to one or more service providers (e.g., service provider 106 and other service providers 108) over the network 104. The request 304 may be received at a server of a service provider (e.g., server of service provider 106). The request 304 may include a request to identify mobile communication devices located within a threshold distance (e.g., the threshold distance 146 of
The service provider 106 may identify one or more mobile communication devices located within the threshold distance (e.g., the threshold distance 146 of
For example, the service provider 106 may send an address message 306 to a mobile locating system (MLS) 122. The address message 306 may identify the physical location (e.g., the physical address) of the access point 102. In an embodiment, the MLS 122 may identify the base station (e.g., the base station 140) based on the physical location identified in the address message 306. In another embodiment, the base station (e.g., the base station 140) may be identified by the service provider 106 and may be identified in the address message 306. The MLS 122 may include a database (not shown) that stores information associated with multiple base stations of the service provider 106. For example, the information associated with a base station (e.g., the base station 140) may include information identifying a physical area associated with a coverage area of the base station and information identifying mobile communication devices within the coverage area of the base station (e.g., the mobile communication devices 128, 132, 144).
The MLS 122 may send one or more mobile communication device identifiers 308 to the service provider 106. The mobile communication device identifiers may include an international mobile equipment identity (IMEI), an international mobile subscriber identity (IMSI), a media access control (MAC) address, a mobile subscriber integrated services digital network (MISDN) number, a subscriber name, a subscriber address, or any combination thereof. In response to receiving the one or more mobile communication device identifiers 308, the service provider 106 may send the one or more mobile communication device identifiers 308 to a gateway location center (GLMC) (e.g., the gateway location center 124). In an embodiment, the one or more mobile communication device identifiers 308 may be transmitted to the GLMC 124 along with information identifying a base station (e.g., the base station 140). The GLMC 124 may be configured to communicate with mobile communication devices (e.g., the mobile communication devices 128, 132, 144) associated with a mobile communication service of the service provider 106. In an embodiment, the GLMC 124 may communicate with the mobile communication devices to acquire location data associated with the mobile communication devices.
For example, during operation the GLMC 124 may send a location request 310 to one or more mobile communication devices based on the one or more mobile communication device identifiers 308. The location request 310 may be transmitted to the one or more mobile communication devices via a base station (e.g., the base station 140). The location request 310 may be a request for positioning information associated with each of the one or more mobile communication devices (e.g., the mobile communication devices 128, 132, 144). In an embodiment, the location request 310 may include ephemeris data associated with the coverage area of the base station (e.g., the base station 140). The ephemeris data may include information identifying one or more satellites accessible to the mobile communication devices (e.g., the mobile communication devices 128, 132, 144). The one or more satellites may be identified based on a base station identifier (e.g., an identifier of the base station 140), information associated with a coverage area of a base station (e.g., a coverage area of the base station 140), a physical location (e.g., the physical address of the access point 102), or any combination thereof. In an embodiment, the GLMC 124 may include a database that includes information associated with satellites of a global satellite positioning (GPS) system (not shown). The database may include satellite identifiers of one or more satellites of the GPS system and information associated with an orbit of each of the one or more satellites. In an embodiment, the GLMC 124 may be configured to determine the ephemeris data based on the database that includes the information associated with the satellites of the GPS system. For example, the GLMC 124 may identify the one or more satellites accessible to the mobile communication devices based on the coverage area of the base station (e.g., the base station 140) and the information associated with the orbits of each of the one or more satellites.
The location request 310 may be received at each of the mobile communication devices (e.g., the mobile communication devices 128, 132, 144). In response to receiving the location request 310, a particular mobile communication device (e.g., the mobile communication device 132) may determine a physical location (e.g., GPS coordinates) of the particular mobile communication device. The particular mobile communication device (e.g., the mobile communication device 132) may transmit location data 312 (e.g., the physical location of the particular mobile communication device) to the GLMC 124 via the base station 140. The GLMC 124 may receive the location data 312 from the particular mobile communication device (e.g., the mobile communication device 132). Further, each of the one or more mobile communication devices (e.g., the mobile communication devices 128, 132, 144) may transmit location data 312 to the GLMC 124.
In an embodiment, the GLMC 124 may forward the location data 312 to the service provider 106. In an embodiment, the GLMC 124 may forward the location data 312 in response to receiving location data 312 from each of the one or more mobile communication devices that received the location request 310. In another embodiment, the GLMC 124 may forward the location data 312 as the location data 312 is received from each of the one or more mobile communication devices.
In response to receiving the location data 312 from the GLMC 124, the service provider 106 may determine whether the particular mobile communication device is within a threshold distance (e.g., the threshold distance 146) of the access point (e.g., the access point 102) based on the location data 312. In an alternative embodiment, the GLMC 124 may determine whether each of the particular mobile communication device is within a threshold distance (e.g., the threshold distance 146) of the access point (e.g., the access point 102) based on the location data 312 and transmit information indicating whether each of the particular mobile communication device is within the threshold distance of the access point to the service provider 106.
The service provider 106 may transmit identification data 314 to a correlation server 116 via the network 104. The identification data 314 may include information identifying one or more mobile communication devices (e.g., the mobile communication devices 128, 132) that are within the threshold distance (e.g., the threshold distance 146 of
In
During operation, the correlation server 116 may receive first data (e.g., the identification data 314) identifying mobile communication devices that are located within a threshold distance of an access point. The correlation server 116 may also receive second data (e.g., the identification data 314) identifying mobile communication devices that are located within the threshold distance of the access point. The correlation server 116 may receive the first data and the second data via a connection to the network 104. The correlation server 116 may store the first data and the second data at a database 118. The correlation server 116 may identify at least one mobile communication device identified by the first data and the second data.
In an embodiment, the first data (e.g., identification data 314) may be received at the correlation server 116 from a mobile communication service provider (e.g., service provider 106) at a first time. The second data (e.g., identification data 314) may be received at the correlation server 116 from the mobile communication service provider (e.g., the service provider 106) at a second time. The correlation server 116 may receive a request from a server associated with an interested party (e.g., the interested party 148). The interested party may be a law enforcement agency or a content provider (e.g., a movie creator/distributor, a music creator/distributor, etc). The request from the server associated with the interested party may be a request for information associated with mobile communication devices located within a threshold distance (e.g., the threshold distance 146 of
As explained in more detail with reference to
Thus, the system 100 of
Referring to
The unauthorized data request type 402, the identifier 404, and the notification lists 406 may be used by the detection server 110 to determine whether a communication (e.g., a communication 202) is associated with an unauthorized data request. During operation, the detection server 110 may detect a communication transmitted over the network 104. The detection server 110 may determine whether the communication is associated with an unauthorized data request. The detection server 110 may determine a data request type associated with the communication. The data request type may correspond to the unauthorized data request type 402 of one or more records 408, 410, 412, 414 of the database 400. The unauthorized data request type 402 may identify a request to access a webpage, a request to initiate a data transfer, or any combination thereof. The detection server 110 may determine whether information associated with the communication matches an identifier of an unauthorized data request (e.g., the identifiers 404). The detection server 110 may also determine whether to notify an interested party (e.g., the interested party 148) of the unauthorized data request. The identifiers 404 may include a digital signature of a file, a digital fingerprint of the file, a watermark of the file, a filename, or any combination thereof. Additionally or in the alternative, the identifiers 404 may include a uniform resource locator (URL) associated with a webpage.
For example, the detection server 110 may detect the communication 202 transmitted over the network 104. As explained above, the detection server 110 may use deep packet inspection to identify a network address (e.g., an internet protocol address) of a destination of the communication 202 (e.g., content provider 114), a network address of a source of the communication 202 (e.g., access point 102), and a type of the communication 202 (e.g., a request to access a webpage).
In an embodiment, the detection server 110 may determine that the communication 202 is associated with a request to access a webpage. The detection server 110 may compare data extracted from the communication 202 to the record 408 which is based on URL Access 416 because the type of the communication 202 and the type 402 of record 408 are associated with requests to access a webpage. The detection server 110 may determine whether data extracted from the communication 202 (e.g., destination address, source address, or information in the data field) matches an identifier 404 of record 408 (e.g., URL1 418). In response to determining that the data extracted from the communication 202 matches the identifier 404 of the record 408 (e.g., the communication 202 is a request to access a webpage identified by URL1 418), the detection server 110 may send the request 304 to one or more service providers as explained with reference to
In another embodiment, the detection server 110 may determine that the communication 202 is associated with a request to initiate a data transfer. The detection server 110 may identify records the 410, 412, 414 as being associated with requests to initiate a data transfer based on the unauthorized data request type 402 associated with each of the records 410, 412, 414 (e.g., Data Transfer 422, Data Transfer 428, Data Transfer 434). The detection server 110 may determine whether data extracted from the communication 202 (e.g., destination address, source address, or information in the data field) matches the identifier 404 of one of the records 410, 412, 414 (e.g., Data Transfer 422, Data Transfer 428, Data Transfer 434). For example, the communication 202 may include a filename associated with the request to initiate a data transfer. The detection server 110 may determine whether one of the identifiers 404 of the records 410, 412, 414 matches the filename associated with the communication 202. In response to determining that the data extracted from the communication 202 matches the identifier 404 of the record 412 (e.g., the filename matches DF3 430), the detection server 110 may send the request 304 to one or more service providers as explained with reference to
In an embodiment, the notification message may inform an interested party (e.g., interested party 148) that an unauthorized data request has been identified. In an embodiment, the interested party may be a music distributor and the request to initiate the data transfer may be associated with downloading a music file owned by the music distributor. The notification message may include a source of the communication 202 (e.g., access point 102), a timestamp, an identifier 404 (e.g., a file name), and other information that may be used by the interested party to identify the communication 202. The notification message may be used by the interested party to identify a user associated with an electronic device that originated the communication 202 as explained with reference to
In another embodiment, the detection server 110 may determine that the communication 202 is associated with a request to initiate a data transfer. The detection server 110 may identify the records 410, 412, 414 as being associated with requests to initiate a data transfer based on the unauthorized data request type 402 associated with each of the records 410, 412, 414 (e.g., Data Transfer 422, Data Transfer 428, Data Transfer 434). The detection server 110 may determine whether data extracted from the communication 202 (e.g., a destination address, a source address, or information in the data field) matches the identifier 404 of one of the records 410, 412, 414 (e.g., Data Transfer 422, Data Transfer 428, Data Transfer 434). For example, the communication 202 may include a filename associated with the request to initiate a data transfer. The detection server 110 may determine whether one of the identifiers 404 of the records 410, 412, 414 matches the filename associated with the communication 202.
In response to determining that the data extracted from the communication 202 matches the identifier 404 of the record 412 (e.g., the filename matches DF3 430), the detection server 110 may determine whether an address (e.g., the destination address or the source address) extracted from the communication 202 matches a network address identified by the identifier 404 of the record 412. For example, the detection server 110 may detect a first request to initiate a first file transfer from a first server. The first file transfer may be associated with a first movie (e.g., movie X) and the first server may be associated with a movie distribution company. A network address of the first server may not be included in the identifier 404 of the record 412. The detection server 110 may detect a second request to initiate a second file transfer from a second server. The second file transfer may be associated with the first movie and the second server may be associated with a peer-to-peer sharing service (e.g., Limewire). A network address associated with the second server may identified in the identifier 404 of the record 412. The detection server 110 may not send an identification request 304 in response to detecting the first request to initiate a file transfer. However, the detection server 110 may send the identification request 304 to one or more service providers as explained with reference to
In another embodiment, the detection server 110 may detect the data 204. The detection server 110 may determine that the data 204 is associated with an unauthorized data request (e.g., a data transfer). The detection server 110 may identify the records 410, 412, 414 as being associated with requests to initiate a data transfer based on the unauthorized data request type 402 associated with each of the records 410, 412, 414 (e.g., Data Transfer 422, Data Transfer 428, Data Transfer 434). The detection server 110 may determine whether data extracted from the data 204 (e.g., a destination address, a source address, or information in the data field) matches the identifier 404 of one of the records 410, 412, 414 (e.g., Data Transfer 422, Data Transfer 428, Data Transfer 434). For example, the data 204 may include one or more file identifiers (e.g., a digital signature of a file, a digital fingerprint of the file, a watermark of the file, and a filename). The detection server 110 may determine whether one of the identifiers 404 of the records 410, 412, 414 matches the file identifiers included in the data 204. In another example, the detection server 110 may process the data 204 (e.g., via a hash algorithm) to determine a digital fingerprint of the data 204. The detection server 110 may compare the determined digital fingerprint to the identifier 404 of the records 410, 412, 414. In response to determining that the digital fingerprint of the data 204 matches one of the identifiers 404 of one of the records 410, 412, 414, the detection server 110 may send the identification request 304 to the service providers 106, 108. The detection server 110 may also send the notification message to the network addresses identified in the notification list 406 of the record that includes the identifier 404 that matches the digital fingerprint of the data 204.
Referring to
Each of the unauthorized data request identifiers 502 may correspond to the identifier 404 of the database 400 (e.g., the databases 112) of
As explained above, the correlation server 116 may receive identification data 314 from the service provider 106 and the other service providers 108. The correlation server may store the identification data in the database 118. In an embodiment, the database 118 may include the information stored at the database 500 of
In another embodiment, the correlation server 116 may receive the first identification data 314 from the service provider 106 and the second identification data 314 from one of the other service providers 108. Prior to storing the first identification data 314 and the second identification data 314, the correlation server 116 may combine the first identification data 314 and the second identification data 314 to produce combined identification data 314 (e.g., the record 512). For example, the first identification data 314 may include a first list of proximate mobile communication devices 504 that identifies one or more mobile communication devices (e.g., M1, M2, M4) and the second identification data 314 may include a second list of proximate mobile communication devices 504 that identifies one or more mobile communication devices (e.g, M3). The correlation server 116 may combine the first list of proximate mobile communication devices 504 and the second list of proximate mobile communication devices 504 to generate the list of proximate mobile communication devices 524 of the record 512. The correlation server 116 may store the combined identification data 314 as a record (e.g., the record 512) at the database 500.
As explained above, the correlation server 116 may access the database 500 to identify a particular mobile communication device (e.g., the mobile communication devices 128, 130, 132) associated with a user of the electronic device (e.g., the personal computing device 134) that originated the communication 202 of
In an embodiment, the correlation server 116 may identify an event of interest (i.e., a particular unauthorized data request) based on information included in the notification message received from the interested party. In another embodiment, the correlation server 116 may identify an event of interest in response to receiving identification information 314 from a service provider. In response to identifying the event of interest, the correlation server 116 may perform a correlation using the records stored at the database 500. For example, the correlation server 116 may identify an event of interest as an unauthorized data request associated with accessing a webpage. The webpage may be identified by an identifier (e.g., URL1 418 of
The correlation server 116 may identify mobile communication devices included in the records 512 and 514. For example, the record 512 includes the list of mobile communication devices 524. The list of mobile communication devices 524 includes device identifiers associated with a plurality of mobile communication devices M1, M2, M3, M4. Additionally, the list of mobile communication devices 524 may indicate that the plurality of mobile communication devices M1, M2, M3, M4 were within a threshold distance of an access point (e.g., access point 102) when the unauthorized data request associated with URL1 522 occurred. Record 512 also includes a timestamp T1 526.
The correlation server 116 may analyze the search results (e.g., the records 512, 514) to identify one or more particular mobile communication devices (e.g., the mobile communication devices 128, 130, 132) associated with the user of the electronic device (e.g., the personal computing device 134) that originated the communication 202 of
Additionally, the correlation server 116 may access the database 500 to identify a particular mobile communication device (e.g., the mobile communication devices 128, 130, 132) associated with a user of the electronic device (e.g., the personal computing device 134) that sent the communication 202 or received the data 204 of
The search may return search results that include the records 516, 518. The correlation server 116 may analyze the search results (e.g., the records 516, 518) to identify one or more particular mobile communication devices (e.g., the mobile communication devices 128, 130, 132) associated with the user of the electronic device (e.g., the personal computing device 134) that originated the communication 202 of
Thus, the database 500 may be used by the correlation server 116 to identify a particular mobile communication device (e.g., the mobile communication devices 128, 130, 132) associated with a user of the electronic device (e.g., the personal computing device 134) that sent the communication 202 of
Referring to
Referring to
Referring to
Referring to
In a networked deployment, the computer system 900 may operate in the capacity of a server or as a client user computer in a server-client user network environment, or as a peer computer system in a distributed peer-to-peer or network environment. The computer system 900 can also be implemented as or incorporated into various devices, such as a personal computer (PC), a tablet PC, a set-top box (STB), a personal digital assistant (PDA), a mobile device, a palmtop computer, a laptop computer, a desktop computer, a communications device, a wireless telephone, a personal trusted device, a web appliance, a network router, switch or bridge, or any other machine capable of executing a set of instructions (sequential or otherwise) that specify actions to be taken by that machine. In a particular embodiment, the computer system 900 can be implemented using electronic devices that provide voice, video or data communication. Further, while a single computer system 900 is illustrated, the term “system” shall also be taken to include any collection of systems or sub-systems that individually or jointly execute a set, or multiple sets, of instructions to perform one or more computer functions.
As illustrated in
In a particular embodiment, as depicted in
In an alternative embodiment, dedicated hardware implementations, such as application specific integrated circuits, programmable logic arrays and other hardware devices, can be constructed to implement one or more of the methods described herein. Applications that may include the apparatus and systems of various embodiments can broadly include a variety of electronic and computer systems. One or more embodiments described herein may implement functions using two or more specific interconnected hardware modules or devices with related control and data signals that can be communicated between and through the modules, or as portions of an application-specific integrated circuit. Accordingly, the present system encompasses software, firmware, and hardware implementations.
In accordance with various embodiments of the present disclosure, the methods described herein may be implemented by software programs executable by a computer system. Further, in an exemplary, non-limited embodiment, implementations can include distributed processing, component/object distributed processing, and parallel processing. Alternatively, virtual computer system processing can be constructed to implement one or more of the methods or functionality as described herein.
The present disclosure contemplates a computer-readable medium that includes instructions 924 so that a device connected to a network 926 can communicate voice, video or data over the network 926. Further, the instructions 924 may be transmitted or received over the network 926 via the network interface device 920.
While the computer-readable medium is shown to be a single medium, the term “computer-readable medium” includes a single medium or multiple media, such as a centralized or distributed database, and/or associated caches and servers that store one or more sets of instructions. The term “computer-readable medium” shall also include any non-transitory medium that is capable of storing or encoding a set of instructions for execution by a processor or that cause a computer system to perform any one or more of the methods or operations disclosed herein.
In a particular non-limiting, exemplary embodiment, the computer-readable medium can include a solid-state memory such as a memory card or other package that houses one or more non-volatile read-only memories. Further, the computer-readable medium can be a random access memory or other volatile re-writable memory. Additionally, the computer-readable medium can include a magneto-optical or optical medium, such as a disk or tapes or other storage device. Accordingly, the disclosure is considered to include any one or more of a computer-readable medium and other equivalents and successor media, in which data or instructions may be stored.
Although the present specification describes components and functions that may be implemented in particular embodiments with reference to particular standards and protocols, the disclosed embodiments are not limited to such standards and protocols. For example, standards for communication include TCP/IP, UDP/IP, HTTP, CDMA, TDMA, FDMA, OFDMA, SC-FDMA, GSM, EDGE, evolved EDGE, UMTS, Wi-Max, GPRS, 3GPP, 3GPP2, 4G, LTE, high speed packet access (HSPA), HSPA+, and 802.11x. Such standards are periodically superseded by faster or more efficient equivalents having essentially the same functions. Accordingly, replacement standards and protocols having the same or similar functions as those disclosed herein are considered equivalents thereof.
The illustrations of the embodiments described herein are intended to provide a general understanding of the structure of the various embodiments. The illustrations are not intended to serve as a complete description of all of the elements and features of apparatus and systems that utilize the structures or methods described herein. Many other embodiments may be apparent to those of skill in the art upon reviewing the disclosure. Other embodiments may be utilized and derived from the disclosure, such that structural and logical substitutions and changes may be made without departing from the scope of the disclosure. Additionally, the illustrations are merely representational and may not be drawn to scale. Certain proportions within the illustrations may be exaggerated, while other proportions may be reduced. Accordingly, the disclosure and the figures are to be regarded as illustrative rather than restrictive.
One or more embodiments of the disclosure may be referred to herein, individually and/or collectively, by the term “invention” merely for convenience and without intending to voluntarily limit the scope of this application to any particular invention or inventive concept. Moreover, although specific embodiments have been illustrated and described herein, it should be appreciated that any subsequent arrangement designed to achieve the same or similar purpose may be substituted for the specific embodiments shown. This disclosure is intended to cover any and all subsequent adaptations or variations of various embodiments. Combinations of the above embodiments, and other embodiments not specifically described herein, will be apparent to those of skill in the art upon reviewing the description.
The Abstract of the Disclosure is provided with the understanding that it will not be used to interpret or limit the scope or meaning of the claims. In addition, in the foregoing Detailed Description, various features may be grouped together or described in a single embodiment for the purpose of streamlining the disclosure. This disclosure is not to be interpreted as reflecting an intention that the claimed embodiments require more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive subject matter may be directed to less than all of the features of any of the disclosed embodiments. Thus, the following claims are incorporated into the Detailed Description, with each claim standing on its own as defining separately claimed subject matter.
The above-disclosed subject matter is to be considered illustrative, and not restrictive, and the appended claims are intended to cover all such modifications, enhancements, and other embodiments, which fall within the scope of the disclosure. Thus, to the maximum extent allowed by law, the scope of the disclosure is to be determined by the broadest permissible interpretation of the following claims and their equivalents, and shall not be restricted or limited by the foregoing detailed description.
Claims
1. A method comprising:
- detecting, at a device coupled to a network, a communication transmitted over the network;
- determining whether the communication is associated with an unauthorized data request;
- in response to determining that the communication is associated with the unauthorized data request, determining an access point associated with a source of the communication; and
- transmitting a message to a service provider, wherein the message requests identification of one or more mobile communication devices that are located within a threshold distance of the access point.
2. The method of claim 1, wherein the access point is a wireless network access point.
3. The method of claim 1, further comprising:
- determining a network address associated with the access point based on the communication; and
- estimating a physical location of the access point based on the network address.
4. The method of claim method of claim 3, wherein the physical location of the access point is estimated based on information received from an internet service provider.
5. The method of claim 1, further comprising determining whether information associated with the communication matches an identifier of the unauthorized data request, wherein the identifier is stored at a database accessible to the device.
6. The method of claim 5, wherein the unauthorized data request is a request to access a website and wherein the identifier includes a uniform resource identifier associated with the website.
7. The method of claim 5, wherein the unauthorized data request is a request to initiate a transfer of a file and wherein the identifier includes a digital signature of the file, a digital fingerprint of the file, a watermark of the file, or any combination thereof.
8. The method of claim 5, further comprising performing a deep packet inspection of one or more packets associated with the communication to identify the information associated with the communication.
9. The method of claim 1, wherein the service provider, in response to receiving the message, transmits a list of the one or more identified mobile communication devices that are located within the threshold distance of the access point to a correlation server.
10. A method comprising:
- receiving, at a server of a mobile communication service provider from a detection server, a request to identify mobile communication devices located within a threshold distance of an access point;
- identifying one or more mobile communication devices located within the threshold distance of the access point; and
- transmitting a message to a correlation server via a network, wherein the message includes information identifying the one or more mobile communication devices.
11. The method of claim 10, wherein the request includes a network address of the access point, the method further comprising:
- estimating a physical address of the access point based on the network address;
- retrieving information associated with a plurality of mobile communication devices located within a coverage area of a base station of the mobile communication service provider, wherein the physical address of the access point is within the coverage area of the base station.
12. The method of claim 11, further comprising sending a location query to each of the plurality of mobile communication devices within the coverage area of the base station, and wherein the location query requests positioning information from each of the plurality of mobile communication devices.
13. The method of claim 12, wherein the location query includes ephemeris data associated with the coverage area of the base station.
14. The method of claim 13, further comprising:
- receiving a response to the location query from one or more of the plurality of mobile communication devices, wherein each response includes location data associated with a location of a particular mobile communication device of the plurality of mobile communication devices; and
- determining, based on the location data, whether each of the plurality of mobile communication devices is located within the threshold distance of the access point.
15. The method of claim 10, wherein the message includes a list of subscribers, wherein each subscriber in the list of subscribers is associated with at least one of the one or more mobile communication devices located within the threshold distance of the access point.
16. The method of claim 10, further comprising:
- receiving, at the server of the mobile communication service provider from the unauthorized data request detection server, a second request to identify one or more additional mobile communication devices located within a threshold distance of an additional access point;
- identifying the one or more additional mobile communication devices located within the threshold distance of the additional access point; and
- transmitting a second message to the correlation server via the network, wherein the second message includes information identifying the one or more additional mobile communication devices located within the threshold distance of the additional access point.
17. A computer-readable storage device comprising instructions that, when executed by a processor, cause the processor to:
- receive first data identifying mobile communication devices that were located within a threshold distance of a first access point;
- receive second data identifying mobile communication devices that were located within the threshold distance of the first access point; and
- identify at least one mobile communication device identified by the first data and the second data.
18. The computer-readable storage device of claim 17, wherein the first data is received from a mobile communication service provider at a first time, wherein the second data is received from the mobile communication service provider at a second time.
19. The computer-readable storage device of claim 18, further comprising instructions that, when executed by the processor, cause the processor to:
- correlate the first data and the second data to generate correlation data, wherein the at least one identified mobile communication device is identified based on the correlation data; and
- store the correlation data at a database.
20. The computer-readable storage device of claim 19, further comprising instructions that, when executed by the processor, cause the processor to:
- receive, from a server, a request for information associated with mobile communication devices that were located within the threshold distance of the of the first access point; and
- send the correlation data to the server.
21. The computer-readable storage device of claim 20, wherein the server is associated with one of a law enforcement agency and a content provider.
22. The computer-readable storage device of claim 17, wherein the first data includes an identifier of an unauthorized data request, an identifier of the at least identified one mobile communication device, a timestamp, a location, a uniform resource identifier, or any combination thereof.
23. The computer-readable storage device of claim 17, wherein the first access point is identified as a source of an unauthorized data request.
24. The computer-readable storage device of claim 23, wherein the first access point is a wireless data communication access point that complies with an institute of electrical and electronics engineers (IEEE) wireless communication standard.
25. The computer-readable storage device of claim 17, wherein the first data is received from a first mobile communication service provider, wherein the second data is received from a second mobile communication service provider.
26. The computer-readable storage device of claim 25, further comprising instructions that, when executed by the processor, cause the processor to:
- identify at least one mobile communication device that is identified by the first data and the second data by performing a correlation of the first data and the second data to generate first correlation data; and
- store the correlation data at a database.
27. The computer-readable storage device of claim 17, further comprising instructions that, when executed by the processor, cause the processor to:
- receive third data identifying mobile communication devices that are located within a threshold distance of a second access point;
- identify at least one mobile communication device that is identified by the first data, the second data, and the third data by performing a correlation of the first data, the second data, and the third data to generate second correlation data; and
- store the correlation data at a database
Type: Application
Filed: Nov 30, 2011
Publication Date: May 30, 2013
Patent Grant number: 8831629
Applicant: AT&T Intellectual Property I, L.P. (Atlanta, GA)
Inventors: Sheldon MEREDITH (Marietta, GA), Jeremy FIX (Acworth, GA), Mario KOSSEIFI (Roswell, GA)
Application Number: 13/308,253
International Classification: H04W 24/00 (20090101);